It may come as a surprise to you, but data networks are not inherently safe. Public network infrastructure is exposed to a multitude of cyber-threats and two thirds of all data theft occurs while it is in transit*. That’s why you should insist upon certified, high-assurance encryption for your data in motion.

The greatest risks to your network data occur when your data includes sensitive information that should not become public. High data volumes (e.g. 10-100Gbps data network links) are increasingly attracting cyber-criminals’ attention.

Encrypting data in motion

Not all encryption solutions are the same

The rapid growth of virtualisation, data centre services, Cloud computing, SaaS and Big Data technologies means we are becoming increasingly reliant on our high-speed/high-availability data networks to deliver information when and where we need it.

However, we often give little thought to where this data is travelling to, how it is stored, who may access it and what it’s been through to appear on our screens. Once your data leaves the perimeter of your protected systems you can’t be sure that it remains secure and doesn’t fall into the wrong hands!


The changing landscape of cyber-crime

Many network devices expose networks to data breaches

With the majority of IT security dedicated to protecting data at rest, cyber-criminals are focusing their attention on data in motion. A potentially rich source of sensitive or valuable information, data networks are seen as “low-hanging fruit” and are increasingly coming under attack.

Firewalls, network switches and routers are not bullet proof. Only robust encryption solutions provide network data with a last line of defence.

The technology exists, and is readily available, that allows fibre optic cable to be tapped and for potentially sensitive data to be read – without breaking the link and remaining undetected without specialist security equipment.

Data-In Motion
Data-In Motion

Robust data encryption – the last line of defence

Technology and operational imperatives are driving an increased demand for ubiquitous connectivity, which is in turn driving and increase in the transmission of sensitive data across both private and public networks.

Most enterprise and government organisations utilise big data and the benefits of Cloud Computing, SaaS and data centre services for back-up and disaster recovery. Other common applications include SCADA control systems, CCTV networks and distributed WAN.  However, the data networks enabling these business applications and information-rich services face serious cyber-risks.

Protecting your network transmitted data against cyber-attacks and successful data breaches is an essential business imperative today. Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. Globally, the priority for government and commercial organisations is to ensure that network transmitted data is protected by robust encryption.

The implications of a significant breach are often catastrophic; not just for the profitability and reputation of an individual company, but for the security and safety of critical infrastructure, citizens, central government and emergency services.

Only encryption may ensure that your data remains protected wile transmitted across data networks and links. However, not all encryption solutions are the same.

Robust encryption (also known as high-assurance encryption) features secure, dedicated encryption devices. In order to be truly high assurance, these devices must use embedded, zero-touch encryption key management; provide end-to-end, authenticated encryption and use standards-based algorithms.

Only through high-assurance network data encryption can you be assured your data is rendered useless in unauthorised hands and that it will remain secure beyond the data’s useful life.


“Robust encryption does not need to come at the expense of network availability and performance. The Senetas range of encryptors provides maximum data protection, without compromising performance, and offers a scalable solution, suitable for all Layer 2 networks and topologies.”


Our encryptors include: small form-factor 10Mbps to 1Gbps devices; carrier-grade 1Gbps to 100Gbps and 10 x 1Gbps to 10 x 10Gbps multi-port rack-mounted units. They support all topologies, Ethernet and Fibre Channel protocols and SPB virtualisation. They operate in full-duplex mode at full line speed, with no packet loss.

*Trustwave Global Data Security Report


Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone